CISM 2012: Information Security Governance (Part 3)


Overview/Description
Target Audience
Expected Duration
Lesson Objectives
Course Number



Overview/Description
In order for information security governance to succeed, there must be an action plan put into place to lay the groundwork for success. This course examines the assets, departments, resources, and people that play a role in bringing an action plan to life. This course will also examine the components and constraints of an action plan, along with providing a sample information security strategy to bring it all together. This course prepares you for the Certified Information Security Manager (CISM) exam.

Target Audience
Experienced IT security professionals seeking to pass the Certified Information Security Manager (CISM) exam or otherwise gain knowledge in managing, designing, and overseeing an enterprise's information security

Expected Duration (hours)
2.0

Lesson Objectives

CISM 2012: Information Security Governance (Part 3)

  • match organizational resources with descriptions of how they are used in developing an information security strategy
  • distinguish between policies, standards, procedures, and guidelines
  • match employee-related resources with descriptions of how they impact development of an information security strategy
  • identify risk-related resources that become part of an information security strategy
  • match strategies for addressing risk to corresponding examples
  • recognize key concepts related to information security strategy resources
  • match the components of an information security action plan with their corresponding roles within the strategy
  • identify types of metrics used to monitor progress toward achieving information security objectives
  • match indicators that security objectives have been met with their corresponding descriptions
  • recognize the key facts about the components of an information security strategy
  • Course Number:
    sp_cisn_a03_it_enus